Search Results - (( developing changing detection algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- developing changing »
- java implementation »
- changing detection »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Develop algorithm for change detection of the salinity from Landsat-8 images
Published 2016“…The aims of this study to develop mathematical algorithms for the salinity change detection from Landsat-8 images. …”
Get full text
Get full text
Conference or Workshop Item -
9
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…The accuracy of the algorithm developed in detecting tumour is 94.38% showing that it is relevant for use by radiologists. …”
Get full text
Get full text
Monograph -
10
Early detection for server availability in University Malaya data center / Mohd Azizi Osman
Published 2016“…The current system has been used manually to monitor the servers and many changes need to fulfill current requirement. The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
Get full text
Get full text
Thesis -
11
Development of Real-Time Eye Tracking Algorithm
Published 2021“…This project develops a real-time eye tracking algorithm to improve the accuracy of iris detection and gaze classification. …”
Get full text
Get full text
Conference or Workshop Item -
12
The effect of different similarity distance measures in detecting outliers using single-linkage clustering algorithm for univariate circular biological data
“…Three circular similarity distance measures; Satari distance, Di distance and Chang-chien distance were used to detect outliers using a single-linkage clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin
Published 2011“…There are many challenges in developing a good background subtraction algorithm. …”
Get full text
Get full text
Research Reports -
14
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
Get full text
Get full text
Final Year Project -
15
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article -
16
Human location estimation using thermopile array sensor
Published 2017“…The average changes in temperature of human is used as a conditional set-point value in the program algorithm to detect human presence. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Real time algorithm for the portable recording of fetal and maternal heart rates
Published 2023“…It automatically adjusts thresholds and parameters to adapt to such ECG changes as the QRS morphology and heart rates. The results acquired by the developed algorithm are also here.…”
Conference paper -
18
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. …”
Article -
19
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…Finally, the collision avoidance algorithm is verified through MATLAB software. Various cases are tested to demonstrate the robustness of both collision detection and avoidance algorithms.…”
Get full text
Get full text
Thesis -
20
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article
